Learn About Firewall Design

Size: px
Start display at page:

Download "Learn About Firewall Design"

Transcription

1 This Learn About briefly introduces guidelines for network firewall planning and design. It summarizes the processes entailed in creating a security policy for your organization that underpins effective firewall design. It also provides links to sites and publications that elaborate on or are related to these processes. Firewall Planning and Design Processes As everyone knows, firewall design entails far more than configuration of the firewall. Processes that comprise an organization s overall security policy inform decisions such as which firewall features will be used, where the firewall will be enforced, and, ultimately, how the firewall will be configured. Firewall technology has evolved from packet filter firewalls to today s next-generation firewalls. At each stage of firewall evolution, new services and solutions emerged to address the expanding complexity of the cyber landscape, to protect resources, and to block and trap attempts by cyber attackers to breach the firewall for nefarious purposes. Today s sophisticated firewalls incorporate a range of features and services that are the outgrowth of these stages of firewall evolution. This Learn About covers a set of five sequential steps to follow when designing a firewall, as shown in Figure 1, and best practices accenting firewall planning and design are provided throughout. These steps apply whether you plan to deploy a single firewall with limited features or full-featured firewalls for various areas of your environment. Step 1. Identify Security Requirements for Your Organization Step 2. Define an Overall Security Policy Step 3. Define a Firewall Philosophy Step 4. Identify Permitted Communications Step 5. Identify the Firewall Enforcement Points Figure 1 Five Best-Practice Steps to Optimal Firewall Design

2 2 Step 1. Identify Security Requirements for Your Organization Security requirements differ among organizations. Before you can secure your network environment, you need to understand your organization s resources, evaluate their security requirements, and assess your current security posture. You can use the information that you collect during this process as input to the remaining steps involved in defining the security requirements for your environment in preparation for configuring and deploying your firewall. Here are some suggestions. Conduct an inventory to identify what it is that you need to protect. Every environment is unique. Catalog your environment s assets and resources. For example: Identify your organization s resources including the hardware and software that comprise your environment and network. Include resources deployed throughout your organization s campus, both at headquarters and branches. Characterize your resources. For example, identify publicly-available databases and customer-facing systems, resources that have high concentrations of sensitive data, and legacy security devices. Identify your data. Organizations have many kinds of data to protect, some of it more valuable and sensitive than others. Your business data may include customer records, a range of employee information, account records, financial information, marketing plans, intellectual property, and state, local, and federal tax information. Specify how that data is handled and protected. Identify transaction flows in your environment. Data is most at risk when it is moved and used throughout the organization. Every time data moves, it is exposed to risks. Identify your connections to partners and guest access networks. Scan your Internet address ranges. Assign quantifiable value and importance to your resources. For example: Consider the degree of sensitivity of each type of data and who will use it. Identify systems used by IT to manage your environment. Breaches to their security could disable the entire network and its resources. Identify and assess the vulnerabilities or potential threats to each resource. A vulnerability assessment is the first step to improving your environment s security posture. Change hats: View your environment as it would be viewed by a cyber-attacker. Review the operating systems and applications used throughout your organization. Determine if they have been maintained and updated with the latest patches, especially when they are used in conjunction with sensitive data. Have a third-party conduct a vulnerability assessment. They can identify critical vulnerabilities in your network.

3 3 RECOMMENDATION There are many commercial products that you can purchase that include templates to help you define a security policy. Obtain a product that accommodates the information that you collect as you define your security policy, its firewall philosophy, the allowed communications, and the organization s network architecture. Use an application that includes auto-generated topology features that build maps and graphical representations of your network architecture based on the information you capture and that renders revised topology maps as your network architecture changes. There are software applications available for purchase that include these features as well as asset management and workflow recording. These tools usually also include features that provide detailed views of LAN and Internet connectivity what s connected to what. Step 2. Define an Overall Security Policy Before a network can be secured for business, a security policy must be defined. Firewalls and other security measures, such as deployment of VPNs, are designed to execute a portion of the security policy. An overall security policy contains the following information and it encompasses the outcome of the work accomplished in two of the five steps: Step 3: Define the Firewall Philosophy and Step 4: Identify Permitted Communications. An effective security policy: Identifies all network resources belonging to the company and the required security for each resource. (See Step 1) Includes a network infrastructure map that is revised as systems are added to or removed from the topology. (See Step 1) Encompasses the organization s firewall philosophy. (See Step 3) Includes coverage of the organization s permitted communications and access policies, and it defines access rights and access levels based on employee job functions and roles. (See Step 4) Articulates the organization s position in regard to security. It defines the culture of the organization with respect to security and how its policies are applied. Identifies the authentication and authorization controls put in place, such as use of user IDs and passwords, single-instance password generators, and certificates. Defines security threats and the actions to be taken to thwart those threats and to respond to successful attacks. Contains a glossary that defines the terms used throughout its documentation to avoid misinterpretation. Is readily available on the LAN to employees and other responsible parties. Many organizations rely on tools that maintain this information and record all changes. Use of these tools ensures consistent application of approved policies and processes. In addition to other benefits, defining a security policy at the outset makes it easier to configure your firewall and ensures that the firewall addresses all of your security requirements. A security policy provides the logic that you apply in configuring the firewall think of it as outlining what the firewall will implement.

4 4 Usually corporate policy for larger enterprises dictates security policy for headquarters as well as for branch and regional sites, but smaller enterprises should also define and document a security policy that their administrators can rely on for direction as the company scales to accommodate growth, supports new applications, and responds to advances in firewall security. A well-documented security policy can guide network administrators in maintaining and managing the firewall. Table 1 summarizes some of the best-practice procedures that an organization might follow in establishing its security policy. Use the guidelines in Table 1 to help you begin defining your own security policy. Table 1 Security Policy Definition Task Define your environment. Identify resources, systems critical to the network, and other systems that require strong defense tactics. Define your current security policy implementation. Define the main threats in plain language and the actions to be taken in the event of a security breach or attack. TIP Instructions Document network assets to be protected throughout your environment, at headquarters as well as at branch and regional offices. Identify the services and systems you want to protect. You cannot deploy a robust firewall to be used successfully unless you have determined what you must protect. Create network diagrams and maps that identify the following information: The locations of all hosts in your system and the operating systems that they run The types and locations of other devices, such as bridges, routers, and switches The types and locations of terminal servers and remote connections Descriptions and locations of any network servers, including the operating system and any installed application software, their configuration information, and which versions they run Location and description of any network management systems used Describe your current security posture. Identify any existing security mechanisms used. For example, identify the following technology and any other mechanisms you use: Antivirus programs Firewalls, if any Security hardware, such as encryptors for servers VPNs Define threats to the system. Define the actions administrators will take after an attack has been identified and resolved. For example: Will you attempt to identify the attacker? If so, what software or other method will you use? Do you plan to prosecute? Will administrators contact the ISP to report the attack? The success of a meaningful security policy depends on whether it is maintained and kept current. Ensure that your security policy is updated as often as necessary. This Learn About does not provide references to examples of corporate information technology security policies because most corporations make their security policies available to employees on private internal Web sites. However, you can view examples of security policies published by government, universities, and some companies on the Web.

5 5 Step 3. Define a Firewall Philosophy A firewall philosophy is the part of your site s security policy that applies strictly to the firewall, and defines your overall goals for the firewall. Setting and documenting a firewall philosophy provides written guidelines that any administrator can follow in implementing the firewall deployment. If you identify how resources, applications, and services are to be protected, it is much easier to define and configure the firewall itself. A firewall philosophy is also essential as new hosts and software are added to the network. Documentation of the firewall philosophy can serve as a means of communicating the current firewall deployment, and factors that contribute to its deployment, to successive IT personnel. Even simple firewalls need a well-documented firewall philosophy to guide their design, deployment, and maintenance. Without a philosophy to guide its implementation and administration, the firewall itself might become a security problem. Table 2 identifies some firewall philosophy components you can include in your own firewall philosophy review document. Table 2 Firewall Philosophy Guidelines Task Identify the objectives for your firewall deployment. Steps Define your primary goals. Are they: To protect against threats from outside your organization? To protect against insider attacks? To monitor user activity? For uses unrelated to security, such as maintaining control over network usage? Define your goals in regard to integrity, confidentiality, and availability. Define your requirements for manageability versus sophistication. Define what constitutes an attack. Determine, for example, whether you consider information gathering (reconnaissance missions) an attack. Do you restrict qualification of attacks to incidents that do damage? Specify if private addressing is to be used. Specify how the firewall is to be managed and updated. Identify the subnetworks to be used. Specify whether you plan to use Network Address Translation (NAT). Identify management tools, audits, and scheduled downtime for periodic testing. Define how alerts and alarms are to be used. Identify security vulnerabilities in the network and rectify them. Record this information in your firewall philosophy document for historical purposes. Test the network integrity before you deploy the firewall for production. Test the network to ascertain that it has not been breached and to ensure that it is not infected with viruses before you deploy the firewall.

6 6 You can establish an overall approach or security stance of least privilege or greatest privilege to guide the development of your firewall philosophy, depending on your network requirements: Least privilege: Lock down the network. Block all network connections in both directions, within the LAN and in relation to the Internet. After all interzone and intrazone traffic is blocked, you can unblock it selectively through policy configuration. The policy configuration can then define precisely and incrementally what is allowed. Least privilege is the more common approach to deployment of a firewall. Greatest privilege: Trust everything inside the network. The policy can then designate specific denial of access to close down access as appropriate. This stance is sometimes taken when the firewall is deployed inline while network activity continues. In this case, the stance allows the firewall to be deployed without disturbing normal business activity that is conducted using the network. NOTE Some sites might deploy the firewall inline, and set and use logs to capture information to identify common, successful attacks. In this case, parts of the network might succumb to an attack. However, based on the logged information, the network administrator can have a better sense of common attacks on the LAN. For example, for Junos OS, this deployment approach would allow the administrator to more definitively understand the appropriate firewall screens and thresholds to put in place. Step 4. Identify Permitted Communications Define an acceptable use policy to specify the types of network activities that are allowed and those that are denied. An acceptable use policy states explicitly what services and applications are allowed for use on the LAN and which Internet Web services and applications are allowed. Before you can define polices for your firewall, you need to understand and characterize your network environment, including the applications that are currently used on the network. In some cases, network administrators are unaware of certain applications that employees use, especially in regard to use of the Internet. For example, employers might not know if employees are using instant messaging services or similar applications, and employees might not be aware that these kinds of applications open entry points into the network that provide easy access for attackers. Maintaining a list of allowed applications and services, any known security risks associated with them, and the means used to secure the application or service is a best practice. This kind of information can be maintained on your corporate intranet and made available to employees. It is also important to understand and document the workflow in your organization based on employee roles and the applications allowed and required for each role. To maintain this information, use the workflow records feature of the software application tool that you purchased. Table 3 gives a simplified example of how you might characterize information that is used for this purpose.

7 7 Table 3 Employee Roles, Access Rights, and Allowed Services and Applications Employee Roles Access Rights Allowed Protocols, Services, and Applications as Applied to Employees Bank Tellers Bank Managers Allowed access to the customer checking and savings records database at corporate headquarters. Allowed access to banking applications for tellers. Not allowed Internet access. Allowed access to both database servers at corporate headquarters: the customer checking and savings records and the customer special services records. Allowed access to Microsoft Office 365 suite of business applications for management and Internet access. Client software for access to transaction processing software on a database server TellPro Accounting Proprietary custom applications Client software for access to transaction and special services software on a database server Microsoft Office 365 Proprietary custom applications Financial Managers Allowed access to both database servers at corporate headquarters: the customer checking and savings records and the customer special services records. Allowed access to financial management application software. Allowed access to Microsoft Office 365 suite of business applications for management and Internet access. Client software for access to transaction and special services software on a database server Section 5 Suite Microsoft Office 365 Proprietary custom applications IT Operations Personnel Bank Executives Allowed access to both servers at corporate headquarters: the customer checking and savings records and the customer special services records. Allowed access to private cloud-based firewall policy management software. Allowed access to Microsoft Office 365 suite of business applications for management and Internet access. Allowed remote access to LAN servers and other devices. Allowed access to intrusion detection and recovery software. Allowed access to both servers at corporate headquarters: the customer checking and savings records and the customer special services records. Allowed access to Microsoft Office 365 suite of business applications for management and Internet access. Allowed access to online collaboration software. Allowed access to online travel schedule management software. Client software for access to transaction and special services software on a database server Nova Identity and Access Management Microsoft Office 365 SNMP FTP rlogon SSH HTTPS Telnet Microsoft Forefront Client software for access to transaction and special services software on a database server Microsoft Office 365 Triangle Concurrence

8 8 Gathering this information can help you define your firewall. Most of the legwork will already be done, and then the firewall configuration simply becomes a software configuration task. When you define allowed communications and access permissions, take into account the type of firewall that you plan to deploy to enforce these requirements. Although packet-filter firewalls that operate up to Layer 3 (transport) and stateful firewalls that operate up to Layer 4 (network) continue to serve specific purposes, they do not provide adequate network protection required to defend against web-based attacks. Web-based attacks can easily pass through well-known ports HTTP (port 80), HTTPS (port 443), and (port 25). Packet-filter and stateful firewalls that are based on protocols and ports are unable to distinguish legitimate applications that rely on those protocols and ports from illegitimate applications and attacks. They are unable to distinguish one kind of Web traffic that uses the port from another. The emergence of application firewalls gave IT teams granular control over access to applications. Application firewalls examined the application and protocol with which a packet was associated and the ports that the applications used. They could inspect traffic contents and block specific content such as Web services and known viruses. Application firewalls monitor and can block application traffic and system service calls. These firewalls allow administrators to permit and restrict access to specific services and applications that were previously made widely available. For example: FTP can be used for banner-grabbing, which allows IT administrators to take inventory of the systems on their network and the services running on open ports. But in the hands of intruders, FTP could be used to find network hosts and extract information about them such as the operating system and its version, any Web servers, and any other applications running on the hosts for which there are known exploits or holes. SSH can be a valuable tool for IT administrators. But in the hands of a malicious user it could be used to breach corporate policy by circumventing content checking, in addition to exposing internal services to outside attacks because of tunneling other IP applications. After you have defined the allowed services and applications and your user access workflow, it is vital to communicate that information to employees in a way that is visible and available. Step 5. Identify the Firewall Enforcement Points Every network has unique characteristics that require equally unique firewall deployment solutions. Many companies deploy different types of firewalls throughout their environment based on the assets and access points they want to protect. Regardless of where the firewall is enforced, simple firewall designs are more likely to be secure and are easier to manage. While special requirements may warrant firewall complexity, unwarranted design complexity lends itself to configuration errors.

9 9 For example, for Juniper Network SRX Series devices that implement firewall security and related services, design and deployment simplicity might translate into: Creating zones that are specific to functional requirements. For example, a zone might consist of employees sharing the same job functions and the same access rights to applications and resources. Separating groups of users from servers. You could assign groups of users to a zone based on the group s subnet. Designing policies that are specific rather than general, and placing the general policies at the bottom of your policy list. TIP Ensure that a zone containing servers does not include users. Determining enforcement points is fundamental to firewall design. As a rule, the primary use of the firewall should largely dictate its enforcement points and configuration. Firewalls are commonly deployed at the edge, or border, between the private LAN and a public network, such as the Internet. However, there are other firewall enforcement points, or deployments, to consider. For example, an enterprise network generally comprises two areas: the core (or internal network) and the edge, but the network can also be extended to include an area called the Demilitarized Zone (DMZ), also known as a perimeter or bastion network. Firewalls are designed and enforced differently in these areas of a network because each area has its specific security requirements, as detailed in Table 4. Table 4 Network Areas and Types of Firewalls Edge: Internet-facing Firewall Protects the border of the network against unauthorized access from the Internet. Defends its hosts against all forms of attack from outside the LAN. Ensures that authorized users are able to perform required tasks by thwarting denial-ofservice (DoS) and other forms of lock-out attacks launched from outside the LAN. Guards the entry points to the LAN by checking each packet to determine if it is allowed through. Core: Corporate-facing Firewall Protects corporate resources from internal opportunistic, accidental, or malicious attacks, such as data theft or DoS floods instigated through a virus. Provides outgoing traffic-handling policies. Ensures that employees have access only to the Internet services they require. Protects against employee use of the network to launch outside attacks. Firewall in the DMZ Provides additional security by creating a less secure area in front of the private network to provide a first line of defense behind which the internal LAN hosts can safely exist. Usually contains publicly accessible servers and bastion hosts. If these servers are attacked, hosts within the LAN are not compromised.

10 10 Maintaining a Secure Environment One of the key elements in maintaining an effective firewall is understanding your network traffic patterns. Knowing what is normal for your network and setting a baseline enables you to measure what you think is irregular behavior and then to set thresholds to protect against attacks. To develop a network profile that accurately reflects the network s state and allows you to establish effective firewall traffic thresholds and other firewall protection, you must understand the network s normal traffic patterns. To define a baseline for your network, use a Real-Time NetFlow Analyzer under normal operating conditions and monitor the network for at least a week. There are many commercial and open-source tools you can use for this purpose, such as MRTG, NetMGR, and OpenNMS. You can also use SNMP. Table 5 lists the kind of information that contributes to a well-defined network traffic profile. NOTE In most cases, you can use a device that is already deployed, such as an SRX Series device, to gather the information required to establish a network baseline. For example, after you have configured and deployed an SRX Series device, you can use the CLI to collect information about your normal network traffic patterns and then use that information to tune your network security. Here are some of the tasks involved in creating a detailed profile of your network s normal behavior: Create a network traffic baseline profile. Create a profile to characterize network host connectivity. For example, in Junos OS you can rate-limit the number of sessions per IP address to avoid a session table flood. Determine the type of ICMP messages to allow, for example, ping versus timestamp messages. Determine the normal ICMP traffic flow. (You can use this information to set boundaries on ICMP traffic to avoid an ICMP address sweep.) Many systems use ICMP for error reporting. It is important to understand what normal ICMP traffic flow is so that you do not impede genuine error-reporting information by setting thresholds that are too low. Determine the normal TCP packet traffic flow. Many network attacks use malformed or hijacked TCP packets to carry out their malicious missions. You can use the packet-filtering features in Junos OS to rate-limit certain types of traffic. For example, in Junos OS you can rate-limit the number of sessions per IP address to avoid a session table flood. However, you cannot effectively determine the thresholds to set for specific types of traffic unless you know the normal traffic flow patterns for your network Table 5 suggests some of the methods that you can use to obtain information that will help you to define your network traffic baseline.

11 11 Table 5 Network Traffic Baseline Profile What is it? How do I create it? Detailed Layer 3 to Layer 7 Characterization of Network Traffic 1. Measure and collect session, flow, and packet statistics from real-time traffic. 2. From these statistics, create a model that describes both average aggregate behavior and average individual behavior on the network. Information the Network Traffic Baseline Profile Provides What Layer 3 to Layer 7 aggregate information can I deduce from the traffic baseline I create? What Layer 3 to Layer 7 individual information can I deduce from the traffic baseline I create? What information can I obtain by comparing this data with Layer 2 to Layer 3 statistics? The number of users on the network How many applications these users are running What percentage of sessions are of a certain protocol type The average bandwidth consumed per user The average number of sessions per user The average packet size on your network The normal error rate on your network The normal fragmentation rate on your network NOTE For networks that incorporate user identify firewall features, consider that a single user could be logged into the network using more than one device. Measurements Required to Create a Network Traffic Baseline Profile What measurements do I need to collect to calculate the average Transport Layer statistics? Bandwidth: You can collect this data from SNMP using tools such as MRTG, NetMGR, and OpenNMS, or you can monitor it using the CLI of a currently deployed device. (You can use the Junos OS CLI for this purpose.) Session count Session rate The preceding three measurements contribute to determining the average aggregate model. These measurements plus the following one constitute the average individual model. User count Average Aggregate Model Calculations How do I calculate the average aggregate model? Session time = session count / session rate Average Individual Model Calculations Bandwidth per session = bandwidth per user / sessions per user Data per session = bandwidth per session x session time How do I calculate the average individual model? Session rate per user = session rate / user count Bandwidth per user = bandwidth / user count Session per user = session count / user NOTE After you create a traffic model, you can use it to validate the methodology that you used to define the baseline. One way to do this is to program traffic-generating test equipment to fit the traffic model and take the same measurements. If they match the

12 12 measurements, then the model is correct. You can use the SRX Series CLI to continue to collect this information. Then you can use the results to fine tune your firewall. You can obtain this information by: Setting SNMP for collecting bandwidth session, and possibly session rate (by zone or interface). Setting policy rules to generate traffic logs that you can collect with the system logs. Security Policy Creation and Firewall Design Summary Deploying an effective firewall for any area of your network entails a great deal more than configuration. This Learn About has explored the processes and best practices that contribute to creating a security policy for your organization and designing its firewall. These best practices enhance the firewall design and configuration process and allow you to deploy a firewall that meets the security requirements for particular areas of your environment. Fundamental to designing and enforcing a strong firewall is keeping current all documentation that defines your environment, and its resources and their security requirements. This documentation should cover the firewall philosophy, reflect the organization s current security posture and its current network state, address allowed communications, and include role-based workflow documentation. It is a living document that should be updated dynamically to reflect ongoing changes. If your environment description is out-of-date, you will leave holes in your firewall configuration and weaken its enforcement. Best practices recommend that you characterize your network, document your current security posture, and determine your organization s position in regard to security. Identify all network resources, their security requirements, and the culture of your organization in relation to its security policies. Create a network map and keep it updated and current as systems are added or removed. Identify known threats and how you will deal with attacks. Document your company s philosophy with respect to the firewall and share that information with your employees. Document operating systems and their versions and patches, and applications running on your systems and their versions and patches. Document how these resources are protected. Define your organization s workflow with respect to allowed communications, access rights based on employee roles, and individual user requirements and responsibilities. It is vital to the security of your environment that you make this information available to employees in a visible way. Determine the firewall enforcement points: Will you deploy a firewall to protect the

13 13 edge (Internet-facing), the core (corporate-facing), or the DMZ (bastion first line of defense)? Or does your environment require firewall enforcement at all of these points? Design your firewall for simplicity, where possible, without sacrificing complete security coverage. As ongoing measures of protection: Develop a network traffic baseline profile that identifies your network s normal traffic patterns to set a baseline to measure against for irregularities. You cannot determine the correct thresholds to set for types of traffic, such as ICMP traffic, without it. Take measurements to create a traffic model, then use the model to validate how you defined the baseline. You cannot set effective thresholds to protect against attacks without it.

14 14 References and Suggested Reading Step 2. Define an Overall Security Policy Step 3. Define a Firewall Philosophy Take a look at these examples of government and university security policies made available to the public on the Web: Government of Canada security policy Creighton University Information security policy Read the Google white paper, Google s Approach to IT Security, made available to the public on the Web. Although more general than a private corporate security policy, this document includes security policy and firewall philosophy content. Although not part of an initial security policy, lifecycle management is used to gather and analyze security data and to apply and enforce security objectives on the ground. Read the Juniper Networks brief on their partnership with Tufin Security Suite in offering security lifecycle management solutions. Read the definitive Junos Security guide to gain hands-on experience with Junos services gateways for the enterprise: Learn about configuring and specifying the order of security policies for firewalls on SRX Series devices: pathway-pages/security/security-authentication-index.html Take a look at information on configuring Junos OS access privilege levels, login classes, and access privilege user permissions for the M Series, MX Series, and T Series routers: Step 4. Identify Permitted Communications For rich, comprehensive coverage of security services on SRX Series devices and an enjoyable read, see the widely acclaimed Juniper SRX Series hands-on reference: To learn more about Junos OS security zones, interfaces, and SRX Series devices, visit here: pathway-pages/security/security-basic-zone-interface.html

15 15 Maintaining a Secure Environment Learn about Junos OS access privilege levels, login classes, and access privilege user permission configuration for the M Series, MX Series, and T Series routers: Read about evolution of the firewall and its various stages. See Learn About: Firewall Evolution: For details on how to use SRX Series screens to protect against denial-of-service attacks, see: For examples of how to configure firewall rate-limiting filters, see: lessfirewall-filter-security-protect-against-tcp-and-icmp-flood-configuring.html For details on Real-Time Performance Monitoring and Flow monitoring and measuring, see: measuring-junos-nm.html For details on configuring SRX Series screens, see the following configuration information and the KB article SRX Getting Started-Configure Screen Protection: pathway-pages/junos-cli/junos-cli.html For facts on Junos OS SNMP, see: snmpjunos-faq.html For information on Junos OS firewall filters and policer, see:

16 by Judy Thompson-Melanson You cannot deploy a robust firewall to be used successfully unless you have determined what you must protect, and this Learn About provides you with all the essential elements that comprise any best-practice network firewall design. In a remarkable twelve pages, you ll know what information to collect, what to do with it, and how to process your network s demand for both connectivity and security. Judy Thompson-Melanson is a Juniper Networks staff technical writer with over twenty-five years in the industry. She has written API documentation, design guides, and networking and security documentation for many companies including Apple, Sun Microsystems, Cisco Systems, and Intuit. The author thanks the following for their engagement in this project: Patrick Ames, Editor in Chief; illustrator, Karen Joice; project promoter, Linnea Wickstrom, and Mark Smallwood, original sponsor. For more information see: juniper.net/documentation 2014 by Juniper Networks, Inc. All rights reserved. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. ISBN: Version History: First Edition, October ISBN

White Paper. Five Steps to Firewall Planning and Design

White Paper. Five Steps to Firewall Planning and Design Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Avaya G700 Media Gateway Security - Issue 1.0

Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Avaya TM G700 Media Gateway Security. White Paper

Avaya TM G700 Media Gateway Security. White Paper Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

What would you like to protect?

What would you like to protect? Network Security What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

This chapter covers the following topics:

This chapter covers the following topics: This chapter covers the following topics: Components of SAFE Small Network Design Corporate Internet Module Campus Module Branch Versus Headend/Standalone Considerations for Small Networks C H A P T E

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Network Security Topologies. Chapter 11

Network Security Topologies. Chapter 11 Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

DeltaV System Cyber-Security

DeltaV System Cyber-Security January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...

More information

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit. Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business

More information

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of

More information

A Model Design of Network Security for Private and Public Data Transmission

A Model Design of Network Security for Private and Public Data Transmission 2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

Firewall Security. Presented by: Daminda Perera

Firewall Security. Presented by: Daminda Perera Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

8. Firewall Design & Implementation

8. Firewall Design & Implementation DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or

More information

FIREWALLS & CBAC. philip.heimer@hh.se

FIREWALLS & CBAC. philip.heimer@hh.se FIREWALLS & CBAC philip.heimer@hh.se Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall? What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to

More information

How To Protect Your Network From Attack From Outside From Inside And Outside

How To Protect Your Network From Attack From Outside From Inside And Outside IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Access control policy: Role-based access

Access control policy: Role-based access Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play.

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Using Ranch Networks for Internal LAN Security

Using Ranch Networks for Internal LAN Security Using Ranch Networks for Internal LAN Security The Need for Internal LAN Security Many companies have secured the perimeter of their network with Firewall and VPN devices. However many studies have shown

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls. Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls. 1 Information systems in corporations,government agencies,and other organizations

More information

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

An Introduction to Network Vulnerability Testing

An Introduction to Network Vulnerability Testing CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

Chapter 15. Firewalls, IDS and IPS

Chapter 15. Firewalls, IDS and IPS Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows) Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,

More information

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This

More information

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations

More information

Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study

Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012 107 Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study Mehdi Jahanirad,

More information

vsrx Services Gateway: Protecting the Hybrid Data Center

vsrx Services Gateway: Protecting the Hybrid Data Center Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates

More information

- Introduction to Firewalls -

- Introduction to Firewalls - 1 Firewall Basics - Introduction to Firewalls - Traditionally, a firewall is defined as any device (or software) used to filter or control the flow of traffic. Firewalls are typically implemented on the

More information

Cisco IPS Tuning Overview

Cisco IPS Tuning Overview Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Secure networks are crucial for IT systems and their

Secure networks are crucial for IT systems and their ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential

More information

Firewalls and Network Defence

Firewalls and Network Defence Firewalls and Network Defence Harjinder Singh Lallie (September 12) 1 Lecture Goals Learn about traditional perimeter protection Understand the way in which firewalls are used to protect networks Understand

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

Overview. Firewall Security. Perimeter Security Devices. Routers

Overview. Firewall Security. Perimeter Security Devices. Routers Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Firewalls, IDS and IPS

Firewalls, IDS and IPS Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not

More information

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. SOLUTION GUIDE Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. North America Radware Inc. 575 Corporate Dr Suite 205 Mahwah, NJ 07430

More information